We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 26

[ total of 169 entries: 1-10 | 7-16 | 17-26 | 27-36 | 37-46 | 47-56 | 57-66 | ... | 167-169 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 6 Jun 2024 (continued, showing 10 of 42 entries)

[27]  arXiv:2406.03322 [pdf, other]
Title: A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2406.03230 [pdf, ps, other]
Title: Defending Large Language Models Against Attacks With Residual Stream Activation Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[29]  arXiv:2406.03193 [pdf, other]
Title: Graph Neural Network Explanations are Fragile
Comments: 17 pages, 64 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30]  arXiv:2406.03187 [pdf, other]
Title: Ariadne: a Privacy-Preserving Communication Protocol
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2406.03186 [pdf, ps, other]
Title: Autonomous Adaptive Security Framework for 5G-Enabled IoT
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[32]  arXiv:2406.03182 [pdf, other]
Title: Reconstructing training data from document understanding models
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2406.03133 [pdf, other]
Title: The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Comments: Accepted to ACM CCS 2024
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2406.02836 [pdf, other]
Title: DREW : Towards Robust Data Provenance by Leveraging Error-Controlled Watermarking
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[35]  arXiv:2406.02768 [pdf, other]
Title: Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[36]  arXiv:2406.02744 [pdf, other]
Title: DPDR: Gradient Decomposition and Reconstruction for Differentially Private Deep Learning
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 169 entries: 1-10 | 7-16 | 17-26 | 27-36 | 37-46 | 47-56 | 57-66 | ... | 167-169 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)